top of page

Token Impersonation From Nessus Credentialed Scan

Writer's picture: Chris CoulombeChris Coulombe

Updated: Nov 28, 2023


In the above video I demonstrate how I'm able to get domain admin from token impersonation of a credentialed Nessus scan. I start by gaining access to the windows host via psexec with a local administrator account (simulating an attacker who gets a foot hold and then privilege escalation). While the Nessus is scanning the windows host, the incognito module of Metasploit is loaded and then tokens are listed. After impersonating the Domain Admin via the Nessus scan, one could take this attack further by accessing shares or by creating a new Domain Admin and logging into the Domain Controller.

41 views0 comments

Коментарі


Inquisitive Cybersecurity

  • alt.text.label.LinkedIn

©2024 by Inquisitive Cybersecurity. 

bottom of page